Docs Cloud Networking BYOC GCP Add a Peering Connection Add a BYOC VPC Peering Connection on GCP A VPC peering connection is a networking connection between two VPCs. This connection allows the VPCs to communicate with each other as if they were within the same network. A route table routes traffic between the two VPCs using private IPv4 addresses. To start sending data to the Redpanda cluster, you must configure the VPC network connection by connecting your Redpanda VPC to your existing GCP VPC. Prerequisites A GCP account. A running BYOC cluster in GCP. See Create a BYOC Cluster on GCP. Your Redpanda cluster and VPC must be in the same region. Create VPCs Go to the VPC section in your GCP project UI. You should see an existing VPC. This has an ID with a redpanda- prefix. If you don’t already have a second VPC to connect your Redpanda network to, create one. This is your Redpanda client. Ensure that its CIDR does not overlap with the Redpanda network from step 1. The following example uses the name rp-client. Create a new peering connection In the GCP project UI, go to Peering Connections. Create a new peering connection with the following values: Your VPC network: rp-client Peered VPC network: redpanda-<id> Save changes. Create another peering connection, with the reverse values as above: Your VPC network: redpanda-<id> Peered VPC network: rp-client Save changes. GCP should set up routing automatically. Connect to Redpanda The cluster Overview page has a variety of ways for you to connect and start sending data. To quickly test this quickly in GCP: Create a virtual machine on your GCP network that has a firewall rule allowing ingress traffic from your IP (for example, <your-ip>/32) Activate the Cloud Shell in your project, install rpk in the Cloud Shell, and run rpk cluster info. If there is output from Redpanda, your connection is successful. Switch from VPC peering to Private Service Connect VPC peering and Private Service Connect use the same DNS hostnames (connection URLs) to connect to the Redpanda cluster. When you configure the Private Service Connect DNS, those hostnames resolve to Private Service Connect endpoints, which can interrupt existing VPC peering-based connections if clients aren’t ready. To enable Private Service Connect without disrupting VPC peering connections, do a controlled DNS switchover: Enable Private Service Connect on the existing cluster and deploy consumer-side resources, but do not create private DNS yet. See: Enable Private Service Connect on an existing cluster. During a planned window, create the private DNS zone and records in your VPC to switch the shared hostnames over to Private Service Connect. Back to top × Simple online edits For simple changes, such as fixing a typo, you can edit the content directly on GitHub. Edit on GitHub Or, open an issue to let us know about something that you want us to change. Open an issue Contribution guide For extensive content updates, or if you prefer to work locally, read our contribution guide . Was this helpful? thumb_up thumb_down group Ask in the community mail Share your feedback group_add Make a contribution 🎉 Thanks for your feedback! GCP Configure Private Service Connect in the Cloud UI